📜 ⬆️ ⬇️

FileCoder ransomware families intensified

Malicious software that encrypts user files and then asks for decryption is not new. Such families have received the general name Filecoder and are a common type of threat - they are called extortionists (ransomware). Over the past few months, we have noted a significant increase in FileCoder encryption activity. ESET antivirus products detect these threats as Win32 / Filecoder and Win32 / Gpcode .

Our ESET Live Grid telemetry system shows that the weekly number of detections of Win32 / Filecoder objects has grown by more than 200% since July 2013 - in comparison with the average for January-June of the same year.


')
Most affected by the activities of this malware Russia. In other countries, activity is present to a lesser extent.



As with other types of Trojan programs, cybercriminals use different methods to install Filecoder on users' computers:


In one of the infection scenarios, we observed that the Win32 / Filecoder.Q modification (and later Win32 / Filecoder.AA , Win32 / Filecoder.W ) was distributed through backdoors, for example, Poison Ivy RAT. The attackers sent the user a backdoor via email. If it was installed on the user's computer, the malicious code contacted its C & C server manager and received the Filecoder extortioner through it.

In another scenario, the attackers used RDP to manually install Filecoder on the computer. We do not have enough information to say how attackers could use RDP for this purpose and obtain access credentials .

FileCoder uses a wide range of capabilities when encrypting files in various of its modifications.


The extortioner uses the following encryption methods:


... and encryption keys can be:


The Filecoder family, which is distributed via RDP, has noticeably improved its tactics using tricks of rogue software (scareware / rogueware) and through the GUI interface presents itself as “Anti-Child Porn Spam Protection” or “ACCDFISA” Security Agency). Of course, such an agency does not exist. Comprehensive information on such options can be found in the Emsisoft blog . This modification is detected by ESET as Win32 / Filecoder.NAC , it has been used by hackers for a long time. It should be noted that it is this modification that differs from the others in the amount of the ransom money, which he asks for decryption - 3000 €. Apparently, this is due to the potential targets of the attackers, who choose various organizations to compromise. At the same time, other representatives of this family extort amounts of € 100–200.

The Win32 / Filecoder.BH option , also known as DirtyDecrypt, has an interesting way to display a buyback message for the user. During the cycle of encrypting the contents of graphic files and documents, the malicious code adds information to the end of the encrypted file with the message shown below.



Another Win32 / Filecoder.BQ option attempts to influence the user by displaying a countdown timer that indicates how much time is left before the ability to decrypt files expires. Interestingly, along with the usual extortionist methods of paying ransom in the form of MoneyPak or Ukash, it allows using Bitcoins for this. More detailed information can be found in our Win32 / Filecoder.BQ Threat Encyclopedia.

Some variants of FileCoder are generated by attackers using a special tool - the builder, similar to the builder of banking Trojans. This tool allows an attacker to select the file types to be encrypted, the encryption method, the message text, and so on.



Some modifications of FileCoder use a weak cipher, incorrect implementation of encryption, or store a password for decryption from where it can be simply received. In this case, it can be much easier to decrypt files, but in most cases attackers do not allow such errors and it is almost impossible to recover encrypted files without a key.

If you are using RDP, take appropriate security measures that prevent arbitrary users from gaining remote access to your system. Consider using a VPN with a two-factor authentication mechanism that allows you to remain secure. In addition, it is good practice to protect your anti-virus software settings with a special password so that an attacker cannot change them.

Source: https://habr.com/ru/post/195014/


All Articles